The knowledge economy makes all of us designers every day. We need to become more adept at inventing and crafting new solutions to new problems.
Organizations are having second thoughts about the offshore outsourcing craze
Up to now, service enablement has largely been the baby of C-level executives and line-of-business managers. Many IT professionals see the promise of the technology, but warn that the reality is several years away.
IT staff transferred to your service provider don't face a bright future
Disk-to-disk solutions are marketed as tape killers. We found one product that may actually live up to that claim.
Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.
Business Objects bills XI Built for Operational BI as a version of its BI suite that’s optimized for operational decision-making
Based on the experiences of several users, BIRT looks like a good start—which should only get better
Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market
Technology is seen as a potential boon to Oracle’s Fusion Middleware initiative
How organizations can get (and stay) compliant while spending less
Implementing a preventive methodology helps establish a solid infrastructure, raising the outsourcing organization's accountability, forcing them to write better code
Unisys, creator of the first Intel “mainframe,” announced a capacity-on-demand service for the x86 and IA-64 set
Few users think Sun’s stewardship will be a good thing for StorageTek or its customers
IT hiring activity looks to be on the rise, but IT compensation levels are stagnating.
Backups do fail. ServerGraph provides a troubleshooting tool to track down and help you solve problems.
Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer?
With Dynamic ODS, DataMirror hopes to break out from its association with AS/400 in the minds of customers
Microsoft Updates XP WiFi Security, Worm Goes Right-Wing
The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.